Vol 9, No 5 (2014)

Open Access Open Access  Restricted Access Subscription or Fee Access

Full Issue

View or download the full issue FULL PDF

Table of Contents

Articles

Using Interval Constrained Petri Nets and timed automata for diagnosis of dynamic systems PDF
Dhouibi Hedi, Lobna Belgacem, L. Mhamdi, Zineb Simeu-Abazi 735-743

An Efficient Real Time Moving Object Detection Scheme Using Diamond Search Algorithm and Mathematical Morphology PDF
Djoudi Kerfa, M. F. Belbachir 744-749

Multi Biometric Fuzzy Vault Generation Using Chaff Points and Cuckoo Search Optimization PDF
K. Annapurani, Deepika Ravikumar, M. A. K. Sadiq 750-756

Bayesian Network Model for Oath Statement Retrieval: A Case Study in Quranic Text Using Machine Learning Techniques PDF
Ahmad Alqurneh, Aida Mustapha 757-763

A Conceptual Foundation for Aspect-Oriented Modeling PDF
Sabah Al-Fedaghi 764-774

An Improved and Efficient Strong Remote User Authentication using Hash function and Smart card PDF
Ramesh Sengodan, V. Murali Bhaskaran 775-783

Image Noise Removal Using Rao-Blackwellized Particle Filter with Maximum Likelihood Estimation PDF
Bobby Lukose, Anna Saro Vijendran 784-792

An Efficient Salient Feature based Histology Image Retrieval PDF
V. Vellingiri, M. Thirumarimurugan, T. Kannadasan 793-802

Securing Data at Rest by Format Preserving Encryption Using Pass Phrase PDF
S. Vidhya, K. Chitra 803-808

An Efficient and Dynamic Data Placement, Data Mining and Knowledge Discovery Using Surrogate Object in Mobile Cloud Paradigm PDF
S. Ravimaran, A. N. Gnana Jeevan, M. A. Maluk Mohamed 809-824

An Efficient User Revocation and Encryption Methods for Secure Multi-Owner Data Sharing to Dynamic Groups in the Cloud PDF
Gokul Geetha Narayanan, S. Raja Ranganathan, S. Karthik 825-831

A Review on Structural Software-Based Self- Testing of Embedded Processors PDF
Ateeq-Ur-Rehman Shaheen, Fawnizu Azmadi Hussin, Nor Hisham Hamid, Noohul Basher Zain Ali 832-846

Swarm and Fuzzy Based Co-operative Cache Management Framework for MANET PDF
A. Sureshkumar, R. Samson Ravindran 847-853

Detection and Localization of Attackers in Wireless Networks PDF
D. Sivakumar, B. Sivakumar 854-864

Enhancement of Indoor Localization by Path-Loss Reduction Using Modified RSSI Technique PDF
K. Vadivukkarasi, R. Kumar 865-871

AAEM: Accessibility Assistance Evaluation Metric PDF
B. Gohin, Viji Vinod 872-882

Built-in Stigmergy-Based Load Balancing Model for HPC Clusters PDF
Ahmed Adnane, H. Medromi 883-891

XML Document Classification by Frequent Itemset Mining on Menonym Tree PDF
D. Sasikala, K. Premalatha 892-899

Erratum

Highly Robust Digital Image Watermarking Using Steerable Pyramid and Dual Encryption Technique (in: Vol. 9, n. 2, 2014)
Azz El Arab El Hossaini, Mohamed El Aroussi, Khadija Jamali, Samir Mbarki, Mohamed Wahbi 900




Please send any question about this web site to info@praiseworthyprize.com
Copyright © 2005-2024 Praise Worthy Prize